Paul B. Janeczko - Candlewick

4
Paul B. Janeczko DECEPTION TECHNIQUES IN WAR FOR IMMEDIATE RELEASE How does deception factor in to fighting wars, and is it effective? In an intriguing companion to The Dark Game, Paul B. Janeczko reveals the truth about the strategic lies of war. On sale April 25, 2017 HC: 978-0-7636-6042-0 $16.99 ($23.00 CAN) Ages 10–14 256 pages Also available as an e-book The biblical account of Gideon. The ancient story of the Trojan Horse. Deceptive techniques have been used in war through the ages. But while the principles have changed very little, the technology behind fooling the enemy has evolved dramatically. Paul B. Janeczko’s fascinating chronology focuses on the American Civil War, World Wars I and II, the Korean War, the Vietnam War, and the Gulf Wars to reveal evolving attitudes toward the use and effectiveness of deceptive operations. Find out the secret plan behind the invasion of Normandy and the details of General Schwarzkopf’s “Hail Mary play” during the Gulf War, among many other strategies and maneuvers designed to pull the wool over enemies’ eyes. Back matter includes source notes, a bibliography, and an index. PAUL B. JANECZKO is a writer of poetry and nonfiction as well as a noted anthologist. His award-winning poetry anthologies include A Poke in the I, A Kick in the Head, A Foot in the Mouth, Firefly July, and The Death of the Hat. He is the author of Worlds Afire, Requiem, Top Secret, and The Dark Game. He lives in Maine. #doublecross

Transcript of Paul B. Janeczko - Candlewick

Paul B. Janeczko

DECEPTION TECHNIQUES

IN WAR

F O R I M M E D I AT E R E L E A S E

How does deception factor in to fighting wars, and is it effective? In an intriguing companion to The Dark Game, Paul B. Janeczko

reveals the truth about the strategic lies of war.

On sale April 25, 2017HC: 978-0-7636-6042-0

$16.99 ($23.00 CAN)

Ages 10–14 • 256 pages

Also available as an e-book

The biblical account of Gideon. The ancient story of the Trojan Horse. Deceptive techniques have been used in war through the ages. But while the principles have changed very little, the technology behind fooling the enemy has evolved dramatically. Paul B. Janeczko’s fascinating chronology focuses on the American Civil War, World Wars I and II, the Korean War, the Vietnam War, and the Gulf Wars to reveal evolving attitudes toward the use and effectiveness of deceptive operations. Find out the secret plan behind the invasion of Normandy and the details of General Schwarzkopf’s “Hail Mary play” during the Gulf War, among many other strategies and maneuvers designed to pull the wool over enemies’ eyes. Back matter includes source notes, a bibliography, and an index.

PAUL B. JANECZKO is a writer of poetry and nonfiction as well as a noted anthologist. His award-winning poetry anthologies include A Poke in the I, A Kick in the Head, A Foot in the Mouth, Firefly July, and The Death of the Hat. He is the author of Worlds Afire, Requiem, Top Secret, and The Dark Game. He lives in Maine.

#doublecross

A Q&A WITH AUTHOR

PAUL B. JANECZKO

Allied troops storm the beach at Normandy on D-day.

How did you become interested in deception? What is your favorite instance of deception?

As a kid, I was a fan of cloak-and-dagger books, and that interest deepened and expanded as I got older and read more. I’d have to say my favorite deception was Operation MINCEMEAT, in which the British created “the man who never was” and dropped him and a briefcase of false information off the coast of Spain for Nazi agents to discover.

Historically, do you feel the effort put into deceiving the enemy is worth it?

There certainly have been deception operations in war that have changed the course of history, like the Trojan Horse and Operation OVERLORD, the deception that fooled the Nazis about the time and place of the D-day invasion. My guess is that military deception is less popular with military strategists, as they rely more on might and electronic eavesdropping.

Imag

e cr

edit

: N

atio

nal A

rchi

ves

(pho

to n

o. 3

06-N

T-18

600

0. C

ourt

esy

Nat

iona

l A

rchi

ves,

pho

to n

o. 2

6-G

-342

2. N

atio

nal A

rchi

ves

(111

-SC

-202

199)

Imag

e cr

edit

: Li

bra

ry o

f Con

gre

ss/M

isce

llane

ous

Item

s in

Hig

h D

eman

d/LC

-USZ

62-1

0589

9

General “Stonewall” Jackson, Confederate master of deception

Tell us a little bit about your writing and research process.

I usually start by reading some general books on the subject, then use the references in those books to find other books that are more specific to my subject. I underline and highlight as I read, then put everything that I’ve noted into word-processing docs for each book, report, and document I’ve read. Along the line, I have a pad always by my side to make notes of things to check. Then I read all my notes, highlighting the things I want to make sure to get into a chapter. Finally I start writing the draft, always with a fountain pen. After I’ve written a few pages, I put that into a word-processing doc. I repeat the process until the chapter is complete. I do a lot of rereading and editing of the draft as I progress, which means that by the time the chapter is complete, I shouldn’t have to do much more editing or rewriting.

Myer’s cipher wheel used by Union soldiers to send secret messages

Gideon leads the Israelites into battle against the Midianites.

Why do you feel these historical events need to be told?

Historical events are markers along the road that got us where we are today. I think that’s particularly important for young readers to understand, because most of them classify the Trojan Horse and the Vietnam War as ancient history.

After writing and researching Double Cross, can you share one of your takeaways from the book?

I wish I could point to a war and say, “Ah, this war settled this issue.” I can’t do that. Oh, there were temporary settlements. But I can’t help but think about the millions of men and women all over the world killed in action and damaged in unspeakable ways, all leaving loved ones to mourn their losses.

Imag

e cr

edit

: C

hris

tian

Imag

e So

urce

Imag

e cr

edit

: Br

own,

J. W

illar

d, T

he S

igna

l Cor

ps, U

.S.A

. in

the

W

ar o

f the

Reb

ellio

n, U

.S. V

eter

an S

igna

l Cor

ps

Ass

ocia

tion

, 189

6.

Other Titles by Paul B. Janeczko

The Dark GameTrue Spy Stories from Invisible Ink to CIA Moles

Short-listed for a YALSA Award for Excellence in Nonfiction for Young Adults

HC: 978-0-7636-2915-1 • PB: 978-0-7636-6066-6 Also available as an e-book

“A wealth of information in an engaging package that should find an enthusiastic audience,

particularly among middle schoolers.” — Kirkus Reviews

Top SecretA Handbook of Codes, Ciphers, and Secret Writing

PB: 978-0-7636-2972-4

“Declaration of truth in reviewing: I have never wanted to make a code in my entire life. Truth

of reading experience: This book made me want to start my own codemaker’s field kit. . . . This

book could convert the unconverted, and for those singers in the choir, it offers months of fun.”

— Chicago Tribune

RequiemPoems of the Terezín Ghetto

HC: 978-0-7636-4727-8 PB: 978-0-7636-6465-7

“Janeczko’s powerful collection points to the troubling dual role that the arts played at Terezín — both as a chilling form of propaganda used by Nazis and an

undeniable source of respite for their victims.”— Publishers Weekly

Worlds AfirePB: 978-0-7636-3400-1

“A memorable historical fiction selection.”— School Library Journal